このページはEtoJ逐語翻訳フィルタによって翻訳生成されました。

翻訳前ページへ


爆撃する-嵐/襲撃する

爆撃する-嵐/襲撃する

Some stuff about

I'm just a guy who enjoys doing things in さまざまな low-level fields. You will find some of my work on this webpage.

Blog 地位,任命するs

 

 

 

 

CTF 令状-up

  • 2022-06-05 - 切り開く/タクシー/不正アクセス.lu 2021: OLLVM (outdated solving for Triton use 事例/患者s)
  • 2022-05-29 - NorthSec 2018: MarsAnalytica (outdated solving for Triton use 事例/患者s)
  • 2021-07-27 - Nuit du 切り開く/タクシー/不正アクセス CTF Quals 2016: Matriochka - Step 3 (outdated solving for Triton use 事例/患者s)
  • 2020-05-03 - AlexCTF 2017: catalyst system (outdated solving for Triton use 事例/患者s)
  • 2020-05-01 - AlexCTF 2017: cpp-is-awesome (outdated solving for Triton use 事例/患者s)
  • 2020-04-26 - 安全 Fest 2016: fairlight (outdated solving for Triton use 事例/患者s)
  • 2020-04-26 - Ekoparty 2016: rev250 (outdated solving for Triton use 事例/患者s)
  • 2018-11-03 - MMA 2015: howtouse (outdated solving for Triton use 事例/患者s)
  • 2018-11-02 - HackCon 2016: angry-reverser (outdated solving for Triton use 事例/患者s)
  • 2018-10-26 - Google 2016: unbreakable (outdated solving for Triton use 事例/患者s)
  • 2017-02-06 - Hackover 2015: r150 (outdated solving for Triton use 事例/患者s)
  • 2016-08-02 - Defcamp 2015: r100 (outdated solving for Triton use 事例/患者s)
  • 2016-08-01 - Defcon Quals 2016: baby-re (outdated solving for Triton use 事例/患者s)
  • 2013-06-23 - 令状-up NDH2k13 Final K1986
  • 2012-06-04 - Defcon 20 quals 2012 - 法廷の 400
  • 2012-06-04 - Defcon 20 quals 2012 - 法廷の 300
  • 2011-09-21 - 切り開く/タクシー/不正アクセス.lu 2011 Antique Space 往復(する) (300)
  • 2011-05-30 - RSSIL 2011 - RCE encrypted とじ込み/提出する
  • 2011-05-29 - RSSIL 2011 - RCE chimay_rouge
  • 2011-04-25 - PlaidCTF 2011 - Another small bug
  • 2011-04-25 - PlaidCTF 2011 - Calculator
  • 2011-03-06 - Insomni'切り開く/タクシー/不正アクセス 2011 - 逆転する 2
  •  

    Vulnerability 開発/利用

  • 2011-07-04 - 分析 of CVE-2011-1938 - ROP 開発/利用 in PHP 5.3.6
  •  

    事業/計画(する)s

  • Triton: A dynamic binary 分析 library

    Abstract: Triton is a dynamic binary 分析 library. It 供給するs 内部の 構成要素s that 許す you to build your program 分析 道具s (象徴的な, taint, 合成, etc.), 自動化する 逆転する 工学, 成し遂げる ソフトウェア 立証 or just emulate i386, x86-64, ARM and AArch64 code.

  • Kaminou-Kernel: Another (unfinished) 小型の Kernel from scratch

    Abstract: Just another (unfinished) kernel from scratch... At first I didn't 計画(する) on 解放(する)ing this 事業/計画(する), but it's dying in a directory. This 事業/計画(する) was just for understanding how the kernel 作品 and 含む/封じ込めるs these に引き続いて features: 保護するd 方式 32 bits, Multitasking, Paging, Memory 配分, Interrupts, Exceptions, Syscalls.

  • Useless emulator for fun (VMNDH-2k12)

    Abstract: This emulator was created for the CTF NDH 2012. Some challenges was on the NDH architecture. The NDH architecture is a new architecture which look like a mix between ARM and x86. The 事業/計画(する) 含む/封じ込めるs a compiler, a debugger and a 事実上の machine.

  • ROPgadget: Gadgets finder and 自動車-roper

    Abstract: This 道具 lets you search your gadgets on your binaries to 容易にする your ROP 開発/利用. ROPgadget supports the ELF, PE and Mach-O 判型 on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures. It also 申し込む/申し出s a dumb ROP-chain 世代.

  • 贈呈s and 出版(物)s

  • Use of 象徴的な 死刑執行 for binary deobfuscation in an 産業の 環境

    PhD 論題/論文, Grenoble, フラン, 2020. [french 論題/論文] [french slide] [bibtex]
    Abstract: This 論題/論文 work has been done in an 産業の 環境 where the main activities were 逆転する 工学 for vulnerability 研究 and 安全 所有物/資産/財産s 立証 on binary programs. The first part of this doctoral work 焦点(を合わせる)s on the collection and 株ing of the 産業の problems when 分析するing binary programs. Based on these 問題/発行するs, a binary dynamic 分析 枠組み has been developed and 形式化するd. Real examples of use are then 現在のd, such as the (犯罪,病気などの)発見 of opaque predicates in 支店 条件s. Finally, a new (a)自動的な/(n)自動拳銃 approach for deobfuscation of binary code 保護するd by virtualization is 現在のd 連合させるing features of the 枠組み 同様に as those of other 道具s.

  • 象徴的な Deobfuscation: From Virtualized Code 支援する to the 初めの

    Talk at DIMVA, Paris-Saclay, フラン, 2018. [paper] [slide] [bibtex]
    Abstract: ソフトウェア 保護 has taken an important place during the last 10年間 ーするために 保護する legit ソフトウェア against 逆転する 工学 or tampering. Virtualization is considered as one of the very best 弁護s against such attacks. We 現在の a generic approach based on 象徴的な path 探検, taint and recompilation 許すing to 回復する, from a virtualized code, a devirtualized code semantically 同一の to the 初めの one and の近くに in size. We define 基準 and metrics to 評価する the relevance of the deobfuscated results ーに関して/ーの点でs of correctness and precision. Finally we 提案する an open-source 体制/機構 許すing to 評価する the 提案するd approach against several forms of virtualization.

  • Deobfuscation of VM based ソフトウェア 保護

    Talk at SSTIC, Rennes, フラン, 2017. [french paper] [english slide] [french ビデオ] [bibtex]
    Abstract: In this 贈呈 we 述べる an approach which consists to automatically 分析する 事実上の machine based ソフトウェア 保護s and which recompiles a new 見解/翻訳/版 of the binary without such 保護s. This 自動化するd approach relies on a 象徴的な 死刑執行 guide by a taint 分析 and some concretization 政策s, then on a binary rewriting using LLVM 移行.

  • How Triton can help to 逆転する 事実上の machine based ソフトウェア 保護s

    Talk at CSAW SOS, NYC, USA, 2016. [slide]
    Abstract: The first part of the talk is going to be an introduction to the Triton 枠組み to expose its 構成要素s and to explain how they work together. Then, the second part will 含む demonstrations on how it's possible to 逆転する 事実上の machine based 保護s using taint 分析, 象徴的な 死刑執行, SMT simplifications and LLVM-IR optimizations.

  • Dynamic Binary 分析 and Obfuscated Codes

    Talk at St'切り開く/タクシー/不正アクセス, Bordeaux, フラン, 2016. [slide]
    Abstract: At this 贈呈 we will talk about how a DBA (Dynamic Binary 分析) may help a 逆転する engineer to 逆転する obfuscated code. We will first introduce some basic obfuscation techniques and then expose how it's possible to break some stuffs (using our open-source DBA 枠組み - Triton) like (悪事,秘密などを)発見する opaque predicates, 再建する CFG, find the 初めの algorithm, 孤立する sensible data and many more... Then, we will 結論する with a デモ and few words about our 未来 work.

  • How Triton may help to analyse obfuscated binaries

    MISC magazine 82, 2015. [french article]
    Abstract: Binary obfuscation is used to 保護する ソフトウェア's 知識人 所有物/資産/財産. There 存在する different 肉親,親類d of obfucation but 概略で, it transforms a binary structure into another binary structure by 保存するing the same semantic. The 目的(とする) of obfuscation is to 確実にする that the 初めの (警察などへの)密告,告訴(状) is "溺死する" in useless (警察などへの)密告,告訴(状) that will make 逆転する 工学 harder. In this article we will show how we can analyse an ofbuscated program and break some obfuscations using the Triton 枠組み.

  • Triton: A Concolic 死刑執行 枠組み

    Talk at SSTIC, Rennes, フラン, 2015. [french paper] [詳細(に述べる)d english slide] [light french slide] [bibtex]
    Abstract: This talk is about the 解放(する) of Triton, a concolic 死刑執行 枠組み based on Pin. It 供給するs 構成要素s like a taint engine, a dynamic 象徴的な 死刑執行 engine, a snapshot engine, translation of x64 指示/教授/教育 to SMT2, a Z3 interface to solve 強制s and Python bindings. Based on these 構成要素s, Triton 申し込む/申し出s the 可能性 to build 道具s for vulnerabilities 研究 or 逆転する-工学 援助.

  • Dynamic 行為 分析 Using Binary Instrumentation

    Talk at St'切り開く/タクシー/不正アクセス, Bordeaux, フラン, 2015. [slide]
    Abstract: This talk can be considered like the part 2 of my talk at SecurityDay. In the previous part, I talked about how it was possible to cover a 的d 機能(する)/行事 in memory using the DSE (Dynamic 象徴的な 死刑執行) approach. Cover a 機能(する)/行事 (or its 明言する/公表するs) doesn't mean find all vulnerabilities, some vulnerability doesn't 衝突,墜落s the program. That's why we must 器具/実施する 明確な/細部 分析 to find 明確な/細部 bugs. These 分析 are based on the binary instrumentation and the runtime 行為 分析 of the program. In this talk, we will see how it's possible to find these に引き続いて 肉親,親類d of bugs : off-by-one, stack / heap 洪水, use-after-解放する/自由な, 判型 string and {令状, read}-what-where.

  • Covering a 機能(する)/行事 using a Dynamic 象徴的な 死刑執行 approach

    Talk at 安全 Day, Lille, フラン, 2015. [slide]
    Abstract: This talk is about binary 分析 and instrumentation. We will see how it's possible to 的 a 明確な/細部 機能(する)/行事, snapshot the 状況 memory/登録(する)s before the 機能(する)/行事, translate the instrumentation into an 中間の 代表,適用する a taint 分析 based on this IR, build/keep 決まり文句/製法s for a Dynamic 象徴的な 死刑執行 (DSE), 生成する a 固める/コンクリート value to go through a 明確な/細部 path, 回復する the 状況 memory/登録(する) and 生成する another 固める/コンクリート value to go through another path then repeat this 操作/手術 until the 的 機能(する)/行事 is covered.

  • An introduction to the Return Oriented Programming and ROP-chain 世代

    Course lecture at Bordeaux University, フラン, 2014. [slide]
    Abstract: This course lecture is about an introduction to the return oriented programming and its variants like JOP, SOP... It also 述べるs some techniques and active 作品 about ROP-chain 世代 based on backtracking or 象徴的な 死刑執行.

  • An introduction to the Return Oriented Programming

    MISC Magazine HS-09, 2014. [link]
    Abstract: This article is about an introduction to the return oriented programming. In this article we 述べる the Operating Systems' 保護s in 詳細(に述べる) and explains why the ROP 開発/利用 is useful. We also 供給するs a detailled step-by-step example of the ROP 開発/利用 on the CVE-2011-1938 vulnerability.

  • ソフトウェア 実験(する)ing and concolic 死刑執行

    Talk at LSE Summer Week, Paris, フラン, 2013. [slide]
    Abstract: This talk is about an introduction to the concolic 死刑執行 using Valgrind and Z3. Concolic 死刑執行 is a technique that uses both 象徴的な and 固める/コンクリート 死刑執行. In this talk we introduce a little 道具 which breaks a dumb crackme.

  • Vulnerabilities 公然と 公表する/暴露するd

  • CVE-2015-1801 - Samsung S4 (GT-I9500) - 多重の Kernel memory 汚職 in the ビデオ driver
  • CVE-2015-1800 - Samsung S4 (GT-I9500) - Kernel memory 公表,暴露 in the ビデオ driver
  • CVE-2013-6392 - Kernel MSM < 3.10 - Kernel memory 公表,暴露 in the Genlock driver
  • CVE-2013-6122 - Goodix gt915 Android touchscreen driver - Kernel race 条件
  • CVE-2013-4740 - Goddix gt915 Android touchscreen driver - 多重の Kernel memory 汚職
  • CVE-2013-4739 - Android Kernel msm-3.4/jb_3* - Kernel memory 公表,暴露 in the Gemini JPEG/Jpeg1.0 engines
  • CVE-2013-4738 - Android Kernel msm-3.4/jb_3* - Kernel Stack 洪水 in camera 地位,任命する 過程ing driver (CPP)
  • CVE-2013-2239 - OpenVZ kernel 2.6.32 (042stab080.1) - 多重の kernel memory 公表,暴露
  • CVE-2013-2164 - Linux Kernel 3.9.5 - Kernel memory 公表,暴露 in cdrom driver
  • CVE-2009-4800 - Sysax FTP server 4.5 - DELE request 扱うing Traversal 独断的な とじ込み/提出する deletion
  • CVE-2009-1031 - Serv-U FTP server 7.4 - MKD request 扱うing Traversal 独断的な directory 創造